• BKZ

  • Referenced in 66 articles [sw10242]
  • least 93-bit security against key-recovery lattice attacks, actually offers at most...
  • LEX

  • Referenced in 19 articles [sw19585]
  • this article we present a key recovery attack on LEX. The attack requires about...
  • TetGen

  • Referenced in 185 articles [sw04046]
  • other related areas. It describes the key software components of TetGen, including an efficient tetrahedral ... constraints (edges and triangles), a new edge recovery algorithm for recovering constraints...
  • Pastry

  • Referenced in 109 articles [sw11775]
  • nodeId that is numerically closest to the key, among all currently live Pastry nodes. Each ... node arrivals, node failures and recoveries. Pastry takes into account network locality; it seeks...
  • PostgreSQL

  • Referenced in 79 articles [sw15935]
  • ACID compliant, has full support for foreign keys, joins, views, triggers, and stored procedures ... Version Concurrency Control (MVCC), point in time recovery, tablespaces, asynchronous replication, nested transactions (savepoints), online/hot...
  • LogGC

  • Referenced in 1 article [sw39052]
  • ramifications of an attack for recovery from it. A key challenge of audit log-based...
  • BibTool

  • Referenced in 1 article [sw33721]
  • recovery; Semantic checks; Sorting and merging of data bases; Generation of uniform reference keys according...
  • ESRGAN

  • Referenced in 7 articles [sw42568]
  • visual quality, we thoroughly study three key components of SRGAN - network architecture, adversarial loss ... stronger supervision for brightness consistency and texture recovery. Benefiting from these improvements, the proposed ESRGAN...
  • FPTree

  • Referenced in 1 article [sw29930]
  • placed in DRAM and rebuilt upon recovery. The FPTree uses Fingerprinting, a technique that limits ... expected number of in-leaf probed keys to one. In addition, we propose a hybrid...
  • Drizzle

  • Referenced in 1 article [sw28750]
  • incur high overheads during adaptation (e.g., recovery), while micro-batch systems, such as Spark Streaming ... high latency during normal operations. Our key observation is that while streaming workloads require millisecond ... having up to 13x lower latency during recovery...
  • TDDAD

  • Referenced in 2 articles [sw38851]
  • controller. Software defined network (SDN) is the key part of the next generation networks ... attack. Then either a defense or recovery action will be taken. We test our scheme...
  • ARMORED

  • Referenced in 1 article [sw37370]
  • data recovery tool FROST was released which exploits the remanence effect of RAM to recover ... smart phone, at worst its disk encryption key. Disk encryption is supported in Android since...
  • DDFS3D

  • Referenced in 1 article [sw39912]
  • recent years, exemplified by shale gas recovery, nuclear waste disposal and enhanced geothermal systems. Displacement ... research are rare, and one of the key reasons lies in the inconvenient access...
  • MIxBN

  • Referenced in 1 article [sw39155]
  • algorithm and the evolutionary algorithm. Thus the key capabilities of the proposed library ... context of solving approximation and gap recovery problems on synthetic data and real datasets...
  • Magma

  • Referenced in 3363 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 5403 articles [sw00545]
  • The result of over 30 years of cutting...
  • MapReduce

  • Referenced in 267 articles [sw00546]
  • MapReduce is a new parallel programming model initially...
  • Mathematica

  • Referenced in 6445 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 13702 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • R

  • Referenced in 10196 articles [sw00771]
  • R is a language and environment for statistical...